NinerNet Communications™
System Status

Server and System Status

NC023, NC027 and NC031: Spectre maintenance

25 April 2018 11:41:21 +0000

Per our previous blog post, three of our servers will be updated to address variants 1 and 2 of the Spectre vulnerability per the following schedule (start times) in chronological order:

As with the previous upgrades for the Meltdown vulnerability, the maintenance windows for each are two hours long, but we expect that each server will be down for much less than that. During the Meltdown maintenance the servers were down for between 13 and 19 minutes, and we expect much the same this time around.

Please click the links above to determine when this will be in your time zone.

During the maintenance of servers NC023 and NC027 you will not be able to send or receive email. Incoming email to your domain will be held on the sending servers until our mail server is back online, and will then be delivered to your accounts. No email will be lost. Please note that email to NinerNet will also be down during the maintenance on server NC027.

During the maintenance of server NC031 your website will be inaccessible, both to you and the public.

NC033: Maintenance complete

28 February 2018 05:51:11 +0000

Server NC033 was down for maintenance between 19:08 and 19:15 on 27 February, and has been successfully updated with current patches. This phase of the maintenance protects against Meltdown; further maintenance for protection against Spectre will take place when patches for it have been developed.

Updates will be posted here.

NC033: Emergency server maintenance

26 February 2018 10:17:51 +0000

Per our previous blog post, the next of our servers to undergo updating is NC033, on which the vast majority of our clients’ (and our own) nameservers (DNS) are hosted. The maintenance window is one hour long, but we expect that the server will be down for much less than that.

The maintenance window starts at:

Please click the link above to determine when this will be in your time zone.

The DNS (domain name system) has redundancy built into it, and we have multiple nameservers distributed in Canada, the US and the UK. This means that while this one server is down the others will take up the slack and this maintenance won’t affect the rest of your services in any way.

If you have any questions or concerns, please feel free to contact us. Thank-you for your patience.

Primary NinerNet website down

15 February 2018 10:29:34 +0000

We are aware of an issue with our main company website and some of the services directly connected to it (such as parked pages) that has started within the last 24 hours. We have not yet identified the cause of this problem, but we are working on finding it and fixing it.

This does not affect any client websites, nor does it affect email. It also does not affect most websites on sub-domains of niner.net — e.g., status.niner.net.

If you are having trouble accessing something that is on the root niner.net (or www.niner.net) domain, please email support.201802@niner.net and we will help you.

We apologise for this inconvenience.

NC023 and NC027: Maintenance complete

19 January 2018 03:30:26 +0000

Server NC023 was down for maintenance between 03:00 and 03:18 and server NC027 was down for maintenance between 03:02 and 03:15, and both have been successfully updated with current patches. This phase of the maintenance protects against Meltdown; further maintenance for protection against Spectre will take place when patches for it have been developed.

Updates will be posted here.

NC031: Maintenance complete

18 January 2018 08:33:02 +0000

Server NC031 was down for maintenance between 07:00 and 07:19, and has been successfully updated with current patches. This phase of the maintenance protects against Meltdown; further maintenance for protection against Spectre will take place when patches for it have been developed.

Updates will be posted here.

NC023 and NC027: Emergency server maintenance

18 January 2018 02:54:25 +0000

Per our previous blog post, the next of our servers to undergo updating are NC023 (the relay server) and NC027 (the primary mail server). The maintenance windows for each are two hours’ long, but we expect that each server will be down for much less than that.

The maintenance window for both starts at:

Please click the link above to determine when this will be in your time zone.

During the maintenance you will not be able to send or receive email. Incoming email to your domain will be held on the sending servers until our mail server is back online, and will then be delivered to your accounts. No email will be lost.

Please note that email to NinerNet will also be down during the maintenance on server NC027.

NC031: Emergency server maintenance

17 January 2018 14:03:35 +0000

Per our previous blog post, the first of our servers to undergo updating is NC031, on which most clients’ website are hosted. The maintenance window is two hours’ long, but we expect that the server will be down for much less than that.

The maintenance window starts at:

Please click the link above to determine when this will be in your time zone.

Please note that the NinerNet website will also be down during the maintenance on server NC031.

Meltdown and Spectre hardware vulnerabilities

17 January 2018 13:58:43 +0000

As you may have heard and read in the news since the beginning of January, major vulnerabilities in very widely used computer hardware (not software) were discovered in mid-2017 by security researchers in Austria, Germany, the United States and Australia, and were publicised on 3 January. Fixes to mitigate some of the vulnerabilities are now being released, and further mitigating measures are under active development where such mitigation is possible.

To this end we will be applying patches to our servers starting tomorrow (18 January) that will necessitate some down time. Due to the nature and scale of this problem — illustrated by the answer to the question, “Am I affected by the vulnerability?” being a simple, “Most certainly, yes” — these patches cannot be delayed or scheduled for a more convenient time. Also, as work continues on ways to mitigate some of the vulnerabilities, there are some updates to the operating systems on our servers that are yet to be developed that will need to be applied in the future. As further related maintenance takes place we will link back to this post.

Following this blog post we will post the details of the first server to undergo patching.

Further details on these vulnerabilities can be read at the following links:

If you have any questions or concerns, please feel free to contact us. Thank-you for your patience.

NC027: Spam clean-up update

28 December 2017 12:27:23 +0000

We have cleaned up the mail server (NC027) after yet another email account was compromised. This necessitated shutting down the mail server between 22:39 and 22:52 UTC yesterday (27 September) while we cleaned up the mess.

This has resulted in the mail server being blacklisted by at least one large mail provider and restrictions put in place by others. The email account in question has been disabled pending resolution of the root cause of this issue, and we are diverting outgoing email to some major mail providers via our relay server until restrictions on our primary mail server’s IP address expire. However, it may still be a few hours more until some outgoing mail is delivered normally without delay.

These incidents usually arise after a client’s computer has been infected with a virus. The virus then sends the email password back to the person or organisation controlling the virus, and they then use that information to compromise that email account on the mail server, using it to send thousands of spams from the account. Please ensure that you install, use and update an anti-virus program on your computers and any other devices to ensure that this doesn’t happen to your email account.

At this time NC027’s IP address is not listed in any of the major blacklists (which operate on an automated basis to remove blacklisted IP addresses once no spam is seen from them), but we will (as always) monitor this and, where necessary, make manual submissions to the smaller, niche blacklists and to ISPs and other mail providers to have our IP address de-listed where that is possible. Manual processes like these can take a couple of days, however.

NinerNet home page

Systems at a Glance:


Loc.SystemStatusPing
Server NC023, London, United Kingdom (Relay server), INTERNAL.NC023InternalUp?
Server NC028, Vancouver, Canada (Monitoring server), INTERNAL.NC028InternalUp?
Server NC031, New York, United States of America (Web server), INTERNAL.NC031InternalUp?
Server NC033, Toronto, Canada (Primary nameserver), OPERATIONAL.NC033OperationalUp?
Server NC034, Lusaka, Zambia (Phone server), INTERNAL.NC034InternalUp?
Server NC035, Sydney, Australia (Secondary nameserver), OPERATIONAL.NC035OperationalUp?
Server NC036, Amsterdam, Netherlands (Mail server), OPERATIONAL.NC036OperationalUp?
Server NC040, Toronto, Canada (Web server), INTERNAL.NC040InternalUp?
Server NC041, New York, United States of America (Web server), OPERATIONAL.NC041OperationalUp?
Server NC042, Seattle, United States of America (Status website), OPERATIONAL.NC042OperationalUp?

Subscriptions:

RSS icon. RSS

Twitter icon. Twitter

Search:

 

Recent Posts:

Archives:

Categories:

Links

Tags:

.co.zm domains .com.zm domains .zam.co domains back-up bounce messages browser warnings connection issues control panel database dns dos attack dot-zm domains down time email email delivery error messages ftp hardware imap mail mailing lists mail relay mail server microsoft migration nameservers network networking performance php phplist pop reboot shaw shaw communications inc. smtp spam spamassassin ssl ssl certificate tls tls certificate viruses webmail web server

Resources:

On NinerNet: